Searched defs:avd (Results 1 - 6 of 6) sorted by relevance

/security/selinux/include/
H A Davc.h69 struct av_decision *avd,
75 denied = requested & ~avd->allowed;
77 audited = denied & avd->auditdeny;
87 * avd.auditdeny & ACCESS == 0 (not set means explicit rule)
94 if (auditdeny && !(auditdeny & avd->auditdeny))
99 audited = requested & avd->auditallow;
115 * @avd: access vector decisions
131 struct av_decision *avd,
136 audited = avc_audit_required(requested, avd, result, 0, &denied);
149 struct av_decision *avd);
68 avc_audit_required(u32 requested, struct av_decision *avd, int result, u32 auditdeny, u32 *deniedp) argument
129 avc_audit(u32 ssid, u32 tsid, u16 tclass, u32 requested, struct av_decision *avd, int result, struct common_audit_data *a) argument
[all...]
/security/selinux/ss/
H A Dconditional.c637 struct av_decision *avd, struct operation *ops)
641 if (!ctab || !key || !avd || !ops)
648 avd->allowed |= node->datum.u.data;
656 avd->auditdeny &= node->datum.u.data;
659 avd->auditallow |= node->datum.u.data;
636 cond_compute_av(struct avtab *ctab, struct avtab_key *key, struct av_decision *avd, struct operation *ops) argument
H A Dservices.c98 struct av_decision *avd,
219 static void map_decision(u16 tclass, struct av_decision *avd, argument
227 if (avd->allowed & current_mapping[tclass].perms[i])
232 avd->allowed = result;
235 if (avd->auditallow & current_mapping[tclass].perms[i])
237 avd->auditallow = result;
240 if (avd->auditdeny & current_mapping[tclass].perms[i])
252 avd->auditdeny = result;
543 struct av_decision *avd)
571 if ((lo_avd.allowed & avd
540 type_attribute_bounds_av(struct context *scontext, struct context *tcontext, u16 tclass, struct av_decision *avd) argument
647 context_struct_compute_av(struct context *scontext, struct context *tcontext, u16 tclass, struct av_decision *avd, struct operation *ops) argument
928 avd_init(struct av_decision *avd) argument
1073 security_compute_av(u32 ssid, u32 tsid, u16 orig_tclass, struct av_decision *avd, struct operation *ops) argument
1122 security_compute_av_user(u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd) argument
[all...]
/security/selinux/
H A Davc.c51 struct av_decision avd; member in struct:avc_entry
447 struct av_decision *avd,
455 denied = requested & ~avd->allowed;
457 audited = denied & avd->auditdeny;
466 audited = requested & avd->auditallow;
479 u32 requested, struct av_decision *avd,
487 requested, avd, od, cmd, result, &denied);
576 static void avc_node_populate(struct avc_node *node, u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd) argument
581 memcpy(&node->ae.avd, avd, sizeo
446 avc_operation_audit_required(u32 requested, struct av_decision *avd, struct operation_decision *od, u16 cmd, int result, u32 *deniedp) argument
478 avc_operation_audit(u32 ssid, u32 tsid, u16 tclass, u32 requested, struct av_decision *avd, struct operation_decision *od, u16 cmd, int result, struct common_audit_data *ad) argument
670 avc_insert(u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd, struct avc_operation_node *ops_node) argument
984 avc_compute_av(u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd, struct avc_operation_node *ops_node) argument
995 avc_denied(u32 ssid, u32 tsid, u16 tclass, u32 requested, u16 cmd, unsigned flags, struct av_decision *avd) argument
1025 struct av_decision avd; local
1113 avc_has_perm_noaudit(u32 ssid, u32 tsid, u16 tclass, u32 requested, unsigned flags, struct av_decision *avd) argument
1160 struct av_decision avd; local
[all...]
H A Dselinuxfs.c713 struct av_decision avd; local
744 security_compute_av_user(ssid, tsid, tclass, &avd);
748 avd.allowed, 0xffffffff,
749 avd.auditallow, avd.auditdeny,
750 avd.seqno, avd.flags);
H A Dhooks.c1550 struct av_decision avd; local
1573 rc = avc_has_perm_noaudit(sid, sid, sclass, av, 0, &avd);
1575 int rc2 = avc_audit(sid, sid, sclass, av, &avd, rc, &ad);
2897 struct av_decision avd; local
2918 rc = avc_has_perm_noaudit(sid, isec->sid, isec->sclass, perms, 0, &avd);
2919 audited = avc_audit_required(perms, &avd, rc,

Completed in 3858 milliseconds